As we’ve seen in other recent examples [1], [2],[3] Tech Support Scammers are using every trick in the malware authors book to get new “customers”. Here is one that takes over the victims’ Windows system after a reboot by using the Winlogon-Shell registry value.
Shell registry valueUnder default circumstances the registry value looks like this:
[HKEY_LOCAL_MACHINESOFTWAREWow6432NodeMicrosoftWindows NTCurrentVersionWinlogon] (64 bits OS) or [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon] (32 bits OS) “Shell”=”explorer.exe”
This makes sure that the user gets access to his Taskbar and Desktop (among other things). It can be changed by so-called skins or replacement shells with the users’ consent, but in this case it was done without consent.
The value was changed to:
“Shell”=”C:Program Files (x86)ProductkeyupdateProductkeyupdate.exe”
As a backup the same was done under the HKEY_CURRENT_USER branch of the registry. So if you manage to change the value under HKEY_LOCAL_MACHINE the user that ran the installer will still be affected. This resulted in this screen after the user logged on:
Due to the lack of the Windows Taskbar the average user will feel quite helpless, but the Tech Support Scammers left an opening, most likely for their own use and designed to make the users feel they actually got some money’s worth. More about that later.
The installerThe installer is a file called Hotstar.exe and was submitted to us by a fellow researcher. We suspect the file was hosted on the site amiga[dot]tech, because of two reasons. The installer opens two browser windows and one of those queries that site. The other one opens up exetracking.weebly.com, a site that can be used to keep track of the number of installs, but the account of this author was suspended a few weeks ago. The other reason is that amiga[dot]tech still hosts a file called Hotstar.exe, but this one installs a fake registry cleaner. (The type that finds 896 infections in 0.2 seconds on a clean Virtual Machine.)
After opening the two browser windows the installer tells you it’s done-
– and it triggers a reboot of the system, no doubt to force the user to find the Tech Support Scammers screen after they log on.
The escapeLooking at the Tech Support Scammers screen you will notice a few options.
That makes us happy since it offers us a way to get back control over the system. In theory we can undo all the changes the installer made and clean the machine manually. But it is a lot easier to remove the file that replaced explorer as the shell, then reboot and let Malwarebytes Anti-Malware handle the rest.
Note that Windows will restore the default registry HKEY_LOCAL_MACHINE value when you remove the file that acted as a shell replacement.
There are obviously several ways of getting around this using the command prompt, but my preferred one would be:
If you already have Malwarebytes Anti-Malware installed it’s even easier:
Md5 of the installer: a9e5af63d548847d26b07e1f4983389d
Md5 of the Productkeyupdate.exe c52203064f03caecb3f54567667b15b9
The Malicious Website Protection component of Malwarebytes Anti-Malware Premium blocks the site amiga[dot]tech.
And the Malware Protection component blocks the execution of the installer.
An elaborate and illustrated removal guide (with or without Malwarebytes Ant-Malware installed) for this infection can be found on our forums.
Summary
We looked at another Tech Support Scam using scare tactics to lure victims into calling their phone number. The method is a bit different, but the end-goal is the same. Take the money and run. So save yourself the hassle and get protected.
Pieter Arntz
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.3